1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
8090 [49]
3 years ago
5

With simple segmentation, a process is divided into a number of segments that need not be of equal size. When a process is broug

ht in, all of its segments are loaded into available regions of memory, and a___.
Computers and Technology
1 answer:
hoa [83]3 years ago
4 0

Answer:

The missing word is <em>backing store.</em>

Explanation:

A backing store is a device for secondary storage of data that typically has greater capacity than the primary store but is slower to access.

A process must be loaded into memory in order to execute.

If there is not enough memory available to keep all running processes in memory at the same time, then some processes who are not currently using the CPU may have their memory swapped out to a fast local disk called the backing store.

The backing store may be the Hard Disk Drive or a Universal Serial Bus Drive.  The backing store can sometimes be referred to as <em>virtual memory.</em>

This memory that appears to exist as main storage although most of it is supported by data held in secondary storage, transfer between the two being made automatically as required.

Cheers!

You might be interested in
What acronym describes networked devices that contain microcomputers but are not thought of as computing devices, such as refrig
vivado [14]
The acronym RFID (Radio Frequency Identification) describes networked devices that contain microcomputers but are not thought of as computing devices, such as refrigerators, automobile components, light bulbs, and industrial control devices. RFIDs are  battery-powered sensors that gather and transmit data to a reading device. Some sensor based technologies are  scanning electron microscopes, LiDAR,radar, GPS, x-ray, sonar, infrared and seismic.



5 0
3 years ago
One of the newest electronic conveniences is the ________, which can serve as a credit card, a debit card, and even unlock doors
77julia77 [94]
Computer Chips. / SILICON. This is just an educated guess
7 0
3 years ago
What is the difference between concrete language and abstract language? give an example of each.
saul85 [17]

The difference between abstract language and abstract language is that abstract language is known through the intellect and concrete language is known through the senses.

<h3>What are abstract and concrete languages?</h3>

The abstract language uses the words like kind, truth, grace, etc. It is a form of language that indicates the intellectual, but concrete language can be known by the senses.

Thus, the distinction between concrete and abstract language is that concrete language is understood via the senses, whereas abstract language is understood through the mind.

To learn more about abstract and concrete languages, refer to the link:

brainly.com/question/16550006

#SPJ4

7 0
2 years ago
A small company with 100 computers has hired you to install a local area network. All fo the users perform functions like email,
Nadusha1986 [10]

Answer:

Based on the requirements indicated in the question above, the best Local Area Network (LAN) operating system that can be used is

Windows 7 , 8.1 or Windows 10. This is because they all are configured to handle extensive LAN activity and can connect over 200 users.

Explanation:  

Generally speaking, Windows 10 packs more improvement over the previous windows.

Cheers

6 0
3 years ago
Nat is defined in rfc ____, which describes methods for connecting private (internal) ip addresses to the internet.
algol13
Describing methods for connecting private (internal) IP addresses to the internet using NAT was defined in RFC 3022. NAT has servers that use port forwarding to send connections from external clients to the Web server on the internal network. NAT is used on routers to hide internet IP address from the internet.



7 0
3 years ago
Other questions:
  • Python full code not displaying<br>only hello prints
    5·1 answer
  • Match the software requirements of a server to their purpose
    5·1 answer
  • ​A(n) ________ database makes it possible to store information across millions of machines in hundreds of data centers around th
    14·1 answer
  • Which organization safeguards americans from health, safety, and security hazards and threats?
    14·2 answers
  • A characteristic of a 3D model that a 2D model does not have is:
    8·1 answer
  • What conclusion did Freud reach when attempting to understand the connection between psychological and physical problems?
    12·1 answer
  • What is Human Dignity
    12·1 answer
  • What happens when you call someone whose phone is off?
    6·2 answers
  • Clearing the computer's cache helps store recently-used information.
    8·1 answer
  • You are creating a program that can add up the amount of money the user spent that day. Right down to the penny! What kind of va
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!